{"title":"基于尸检和波动性解决方案的企业信息系统网络事件调查","authors":"M. F. Goncharenko","doi":"10.31673/2409-7292.2022.022229","DOIUrl":null,"url":null,"abstract":"This article provides information on basic investigation methods for any organization based on Autopsy and Volatility solutions. Possible sources of data and the difficulty of extracting certain information from them are analyzed. General recommendations for conducting investigations are offered. The considered tools and the process of analyzing the received data.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Investigation of cyber incidents in the corporate information system based on Autopsy and Volatility solutions\",\"authors\":\"M. F. Goncharenko\",\"doi\":\"10.31673/2409-7292.2022.022229\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article provides information on basic investigation methods for any organization based on Autopsy and Volatility solutions. Possible sources of data and the difficulty of extracting certain information from them are analyzed. General recommendations for conducting investigations are offered. The considered tools and the process of analyzing the received data.\",\"PeriodicalId\":107068,\"journal\":{\"name\":\"Modern information security\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Modern information security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31673/2409-7292.2022.022229\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Modern information security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31673/2409-7292.2022.022229","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Investigation of cyber incidents in the corporate information system based on Autopsy and Volatility solutions
This article provides information on basic investigation methods for any organization based on Autopsy and Volatility solutions. Possible sources of data and the difficulty of extracting certain information from them are analyzed. General recommendations for conducting investigations are offered. The considered tools and the process of analyzing the received data.